1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
3 years ago
9

What command prompts should be used to assign an IP address to:

Computers and Technology
1 answer:
S_A_V [24]3 years ago
7 0

Answer:

...

Explanation:

A. Cisco Router

1. Enter global configuration mode using the next commands:

Router>enable

Router#configure terminal

2. enters the configuration mode for a Gigabit Ethernet interface on the router using this command:

interface gigabitethernet slot/port

Example:

Router(config)# interface gigabitethernet 0/1

3. Set the IP address and subnet mask for the specified GE interface using this command:

ip address x.x.x.x y.y.y.y

Example:

Router(config-if)# ip address 192.168.0.1 255.255.255.0

4. Finally, enable the GE interface, changing its state from administratively down to administratively up:

Router(config-if)# no shutdown

Exit configuration mode for the GE interface and returns to global configuration mode using this:

Router(config-if)# exit

B. Cisco Switch

Normally Cisco switches forward Ethernet frames without any configuration. so you don´t need to assign them an IP address, but to perform switch management over the network or use protocols such as SNMP, the switch will need to have an IP address. Here are the steps:

1. Enter global configuration mode using the next commands:

Switch>enable

Switch#configure terminal

2. Enter the VLAN 1 configuration mode:

Switch(config)#int vlan 1

3. Assign an IP address with the ip address IP ADDRESS SUBNET MASK interface subcommand.

Example:

Switch(config-if)#ip address 10.0.0.1 255.0.0.0

4. Enable the VLAN 1 interface with the no shutdown interface subcommand.

example:

SW1(config-if)#no shutdown

C. Local PC

1. Click Start Menu > Control Panel > Network and Sharing Center or Network and Internet > Network and Sharing Center.

2. Click Change adapter settings.

3. Right-click on Wi-Fi or Local Area Connection.

4. Click Properties.

5. Select Internet Protocol Version 4 (TCP/IPv4).

6. Click Properties.  

7. Select Use the following IP address.

8. Enter the IP address, Subnet mask, Default gateway, and DNS server.

9. Click OK.

You might be interested in
Write the function "zipper". the function will take two array/list/table parameters and return a new array/list/table which will
MakcuM [25]
What is the problem what am I supposed to do?
4 0
3 years ago
Amanda wants to prevent sensitive data from being sent via email in her organization. What type of agent software can she instal
melamori03 [73]

The type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company is a strong antivirus software.

<h3>What are some ways to handle against email phishing attacks?</h3>

People are known to have system and they are said to have different kinds of attacks from outside sources. The ways to protect yourself from Phishing are:

  • Be on guard towards the  handing of sensitive information.
  • Never click on alarming messages.
  • Do not open any form of attachments that is suspicious or strange.

Learn more about  phishing attacks from

brainly.com/question/2537406

8 0
2 years ago
Projects used for print and web have different ?
mr Goodwill [35]

Answer:

Sizes

Explanation:

6 0
3 years ago
The "fathers of the internet" are vinton cerf and ________.
Harrizon [31]
Robert E Kahn I hope this helps
8 0
3 years ago
Dashed lines that display on your slide when you are moving an object and that assist you with alignment are referred to as:
Umnica [9.8K]
Smart guides is the answer.
7 0
3 years ago
Read 2 more answers
Other questions:
  • 11. You should type _
    6·2 answers
  • What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another
    6·1 answer
  • A firewall is either software or dedicated hardware that exists between the __________ being protected.
    13·1 answer
  • Which type of JPEG image records the most information in the digital file? Medium Low Fine Expert
    6·2 answers
  • Which is the correct expansion of the term Internet? 
    9·2 answers
  • A computer has 9850 processes and 172 of them where suspended while 276 were terminated.,explain why some of the processes where
    15·1 answer
  • A character with the point size of 10 is about 10/72 of once inch in height
    8·1 answer
  • Which is true about lists and stacks?
    8·1 answer
  • Advanced Electronics has employees who use a company website to share work. By posting on the website, employees are
    7·1 answer
  • The user cannot use a computer system without.................... software<br><br>​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!